Bug 1227235 (CVE-2024-27628) - VUL-0: CVE-2024-27628: dcmtk: buffer overflow via the EctEnhancedCT method
Summary: VUL-0: CVE-2024-27628: dcmtk: buffer overflow via the EctEnhancedCT method
Status: RESOLVED FIXED
Alias: CVE-2024-27628
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/412392/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-01 12:52 UTC by SMASH SMASH
Modified: 2024-07-08 09:35 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 2 Christophe Marin 2024-07-01 13:37:51 UTC
The fix for this one was also submitted months ago to all supported openSUSE versions:

Factory: SR#1169995
15.5: SR#1169994
15.6: SR#1169993

Reassign to secteam
Comment 3 Andrea Mattiazzo 2024-07-08 09:35:04 UTC
All done, closing.